Understanding MTU (Maximum Transmission Unit) Link to heading

The MTU represents the largest size (in bytes) of a packet that can be transmitted over a network. Selecting an appropriate MTU size can significantly impact performance, especially in environments with varied network configurations and encapsulations.

Discovering MTU Using Ping and the “Don’t Fragment” Flag Link to heading

To discover the MTU between two networks, you can use the ping command with the “Don’t Fragment” flag. This allows you to test packet sizes and identify the largest size that does not result in fragmentation. Here are examples for Windows, Ubuntu, and macOS:

Windows Link to heading

  1. Open Command Prompt.
  2. Run the following command:
    ping <destination> -f -l <size>
    
    • Replace <destination> with the target IP or hostname.
    • Replace <size> with the packet size to test.
  3. Adjust <size> downward if you receive the message: “Packet needs to be fragmented but DF set.”

Ubuntu Link to heading

  1. Open a terminal.
  2. Run the following command:
    ping <destination> -M do -s <size>
    
    • Replace <destination> with the target IP or hostname.
    • Replace <size> with the packet size minus 28 bytes (for ICMP headers).
  3. Reduce <size> if the ping fails.

macOS Link to heading

  1. Open Terminal.
  2. Run the following command:
    ping -D -s <size> <destination>
    
    • Replace <destination> with the target IP or hostname.
    • Replace <size> with the packet size minus 28 bytes (for ICMP headers).
  3. Lower <size> until you get a successful response.

Common MTUs with Encapsulation Link to heading

Below is a table of common MTU sizes for Ethernet and its variations:

Network Type MTU (bytes)
Standard Ethernet 1500
VLAN Tagging (802.1Q) 1500
MPLS 1500
PPPoE 1492
GRE 1476
IPSec (ESP over IPv4) 1438-1446
IPv6 with IPSec 1400-1420

Note that these values may vary depending on network configurations and encapsulations.

DHCP Option 26 Link to heading

DHCP Option 26 allows a DHCP server to specify the MTU size for clients. While useful, not all devices honor this setting, particularly in complex environments with mixed hardware and software.

  • Devices that ignore Option 26 typically rely on default MTU values or manually configured settings.
  • Administrators should test devices in their environment to ensure compliance and performance.

MSS Clamping and Path MTU Discovery Link to heading

MSS Clamping modifies the Maximum Segment Size (MSS) value in TCP headers to ensure that packets do not exceed the MTU. This is particularly useful when:

  • Path MTU Discovery (PMTUD) fails due to improperly handled ICMP messages.

While MSS clamping is helpful, it is not a guaranteed solution. For instance:

  • Routers or firewalls dropping ICMP “Fragmentation Needed” messages can disrupt PMTUD.
  • Applications that do not rely on TCP may still experience fragmentation issues.

Recommendations Link to heading

  1. Use tools like ping to verify MTU between critical network points.
  2. Monitor devices for compliance with DHCP Option 26.
  3. Implement MSS clamping as a safeguard but test thoroughly to avoid relying solely on it.

By understanding these principles and testing configurations, network performance can be optimized for diverse environments without introducing avoidable errors or bottlenecks.